Search

Suzanne C Deffeyes

from Weaverville, NC
Age ~59

Suzanne Deffeyes Phones & Addresses

  • 44 Applecross Rd, Weaverville, NC 28787 (828) 484-8104
  • 5904 Rain Creek Pkwy, Austin, TX 78759 (512) 349-9287
  • 9417 Great Hills Trl, Austin, TX 78759 (512) 349-9287
  • 13328 Black Canyon Dr, Austin, TX 78729 (512) 219-9648
  • Manassas, VA
  • Gaithersburg, MD

Publications

Us Patents

Non-Real-Time Enhanced Image Snapshot In A Virtual World System

View page
US Patent:
8363051, Jan 29, 2013
Filed:
May 7, 2009
Appl. No.:
12/436944
Inventors:
Suzanne Carol Deffeyes - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06T 15/00
US Classification:
345419
Abstract:
A computer implemented method, a tangible computer storage medium, and a data processing system generate a non-real-time image snapshot in a virtual world. A backend rendering system receives a scene description from a virtual world server. The backend rendering system then retrieves a high fidelity graphics from a visual database. The visual database contains both the high fidelity graphics and a lightweight graphics. The lightweight graphics are utilized to render the virtual world at a virtual world client application. The backend rendering system then renders the non-real-time image snapshot, and processes the non-real-time image snapshot into the desired format. The non-real-time image snapshot can then be delivered to a client.

Providing Compartmentalized Security In Product Reviews

View page
US Patent:
8521503, Aug 27, 2013
Filed:
Jun 17, 2010
Appl. No.:
12/817455
Inventors:
Boas Betzler - Magstadt, DE
Suzanne C. Deffeyes - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 9/445
US Classification:
703 22, 703 2, 707661, 706 52, 463 16
Abstract:
A mechanism is provided for providing compartmentalized security in product reviews. A central authoritative state module within a compartmentalized security mechanism identifies a clearance level associated with a user that has been authenticated. Responsive to the clearance level of the user being sufficient to access the information, the central authoritative state module determines whether the information requires a simulation to be executed. Responsive to the information failing to require execution of a simulation, a coordination module in the compartmentalized security mechanism retrieves the information. A display and input interaction module on a client system then displays the information in accordance with the clearance level of the user thereby forming displayed information. Displaying the information in accordance with the clearance level of the user comprises displaying in detail only portions of the information of the product that the user has access to.

Augmenting Virtual Worlds Simulation With Enhanced Assets

View page
US Patent:
8531453, Sep 10, 2013
Filed:
Jun 30, 2010
Appl. No.:
12/826764
Inventors:
Sean L. Dague - Poughkeepsie NY, US
Suzanne C. Deffeyes - Austin TX, US
Michael C. Pitman - Wappinger Falls NY, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06T 15/00
US Classification:
345419, 345473, 345474, 345475, 345629
Abstract:
A system and method includes using a side simulation device for: receiving a scene description of a virtual world scene from a virtual world simulator, including a description of a special object that requires modification, and descriptions of other objects in an immediate vicinity of the special object; receiving a description of a desired modification to the special object; performing the modification of the special object to provide an enhanced special object such that the enhanced special object can be fully integrated with the other objects in the scene; transmitting the enhanced special object to a data store; and transmitting a proxy object signal to the simulator means to be placed in the virtual world scene to alert any viewers of the virtual world scene to refresh their view by adding the enhanced special object to their simulation by accessing the enhanced special object from the data store.

Enhanced Asset Management And Planning System

View page
US Patent:
20120313963, Dec 13, 2012
Filed:
Jun 13, 2011
Appl. No.:
13/158715
Inventors:
Suzanne C. Deffeyes - Austin TX, US
Neil Katz - Parkland FL, US
Brian M. O'Connell - Cary NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G09G 5/02
G09G 5/00
US Classification:
345593, 345633
Abstract:
An embodiment of the invention provides a method for displaying information on a portable device, wherein the portable device includes an interface, a camera, and a screen. The interface identifies an object to be installed; and, the camera captures at least one image, wherein the image includes locations for installing objects. The screen displays an augmented image of locations for installing objects, wherein the augmented image identifies at least one optimal location for installing the object.

Positional Context Determination With Multi Marker Confidence Ranking

View page
US Patent:
20130002717, Jan 3, 2013
Filed:
Jun 30, 2011
Appl. No.:
13/174669
Inventors:
Suzanne C. Deffeyes - Austin TX, US
Richard J. Newhook - West Chester PA, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G09G 5/377
US Classification:
345633
Abstract:
An augmented reality (AR) system receives image data from a camera of mobile device. The image data includes images of objects in the field of view of and at least two markers. A repository contains position information for objects and markers that may potentially appear in an image. The AR system receives a confidence level for the markers in the image, and selects the marker with the highest confidence level. The transformation and position of the marker in the image data is used to determine the identity of objects in the field of view. Further, the AR system generates overlaid image data that can be incorporated into the image data and sent back to be displayed on the mobile device. The overlaid image data is positioned according to the position data for the object it is associated with, and the transformation and position data for the selected marker.

Bounding Volume For 3D Graphic Primitives

View page
US Patent:
62430971, Jun 5, 2001
Filed:
Dec 10, 1998
Appl. No.:
9/210136
Inventors:
Daniel Alan Brokenshire - Round Rock TX
Suzanne Carol Deffeyes - Austin TX
Gordon Clyde Fossum - Austin TX
Barry L. Minor - Austin TX
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06T 1540
US Classification:
345421
Abstract:
A method of and system for testing a graphic primitive for trivial acceptance or rejection. An initial bounding volume, such as a rectangular parallelepiped, is defined by the graphic primitive's maximum and minimum x, y, and z coordinates in an initial coordinate system. A first bounding volume is then defined by the graphic primitive's maximum and minimum x', y', and z' coordinates in a first coordinate system, where the first coordinate system is transformed with respect to the initial coordinate system. Preferably this transformation comprises a 45. degree. rotation about a common axis such as the z-axis. The initial bounding volume and the first bounding volume are then intersected to form a modified bounding volume. The vertices of the modified bounding volume are then available for use in determining whether the graphic primitive may be trivially rejected or accepted within a specified viewing volume. In one embodiment, the method further includes defining and using a second modified bounding volume by intersecting the initial bounding volume with a second bounding volume defined by the graphic primitive's maximum and minimum x", y", and z" values in a second coordinate system.

Cognitive Offense Analysis Using Contextual Data And Knowledge Graphs

View page
US Patent:
20200120115, Apr 16, 2020
Filed:
Dec 12, 2019
Appl. No.:
16/712569
Inventors:
- Armonk NY, US
Suzanne Carol Deffeyes - Weaverville NC, US
Jiyong Jang - White Plains NY, US
Youngja Park - Princeton NJ, US
Josyula R. Rao - Briarcliff Manor NY, US
Marc Philippe Stoecklin - White Plains NY, US
International Classification:
H04L 29/06
G06F 21/57
G06F 21/56
G06F 21/00
Abstract:
An automated method for processing security events in association with a cybersecurity knowledge graph. The method begins upon receipt of information from a security system representing an offense. An initial offense context graph is built based in part on context data about the offense. The graph also activity nodes connected to a root node; at least one activity node includes an observable. The root node and its one or more activity nodes represent a context for the offense. The knowledge graph, and potentially other data sources, are then explored to further refine the initial graph to generate a refined graph that is then provided to an analyst for further review and analysis. Knowledge graph exploration involves locating the observables and their connections in the knowledge graph, determining that they are associated with known malicious entities, and then building subgraphs that are then merged into the initial graph.

Methods And Systems For Managing Security In Computing Networks

View page
US Patent:
20190173910, Jun 6, 2019
Filed:
Dec 6, 2017
Appl. No.:
15/833447
Inventors:
- Armonk NY, US
Suzanne C. DEFFEYES - Weaverville NC, US
Gary K. THORNTON - Carrollton TX, US
Amir KHAN - Brookfield CT, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
H04L 29/06
Abstract:
Embodiments for managing computing network security by one or more processors are described. A signal that is representative of authorized anomalous behavior is received. The signal includes at least one of an identity and a type of activity associated with the authorized anomalous behavior. A security incident is detected. If the detected security incident corresponds to the authorized anomalous behavior, the generating of an alert in response to the detecting of the security incident is suppressed.
Suzanne C Deffeyes from Weaverville, NC, age ~59 Get Report